Á¢ÌÕÍð¶à¸ö×éÖ¯µÄÍøÕ¾Ôâµ½KillnetÍÅ»ïµÄDDoS¹¥»÷
Ðû²¼Ê±¼ä 2022-06-301¡¢Á¢ÌÕÍð¶à¸ö×éÖ¯µÄÍøÕ¾Ôâµ½KillnetÍÅ»ïµÄDDoS¹¥»÷
¾ÝýÌå6ÔÂ28ÈÕ±¨µÀ£¬Á¢ÌÕÍðµÄ¹ú¼Ò˰Îñ¼à²ì¾Ö(STI)ºÍ»á¼Æ·þÎñÌṩÉÌB1.ltµÈ¶à¸ö×éÖ¯Ôâµ½ÁËKillnetÍÅ»ïµÄDDoS¹¥»÷¡£¹¥»÷·¢ÉúÔÚ6ÔÂ27ÈÕ£¬¸Ã¹ú¹ú¼ÒÍøÂçÄþ¾²ÖÐÐÄ(NKSC)֤ʵ£¬´Ë´ÎʼþÓ°ÏìÁ˹ú¼ÒÄþ¾²Êý¾Ý´«ÊäÍøÂçÒÔ¼°Ë½ÓªºÍ¹«¹²²¿ÃŵÄ×éÖ¯¡£²¢ÌåÏÖ£¬ÕâÖÖ¹¥»÷ºÜ¿ÉÄÜ»áÁ¬Ðø¼¸Ì죬Ö÷ÒªÊÇÕë¶ÔͨÐÅ¡¢ÄÜÔ´ºÍ½ðÈÚÁìÓò¡£KillnetÔÚÒ»¶ÎÊÓÆµÖÐÉù³Æ¶Ô´ËÊÂÂôÁ¦£¬²¢Ôö²¹ËµËûÃÇÒѾ¹¥»÷ÁË1652¸öÍøÂç×ÊÔ´£¬ÔÚ39СʱÄÚʵÏÖÁ˶ÔÁ¢ÌÕÍð70%µÄÍøÂç»ù´¡ÉèÊ©µÄ¸ôÀë¡£
https://www.hackread.com/russia-killnet-group-lithuania-sites-ddos-attacks/
2¡¢Service Fabric´æÔÚ©¶´FabricScape£¨CVE-2022-30137)
6ÔÂ28ÈÕ£¬Unit 42Åû¶ÁË΢ÈíService FabricÖеÄ©¶´FabricScape£¨CVE-2022-30137)µÄÏêÇé¡£¸Ã©¶´´æÔÚÓÚÕï¶ÏÊÕ¼¯ÊðÀí(DCA)×é¼þÖУ¬¿ÉÔÚÅäÖÃΪ¾ßÓÐÔËÐÐʱ·ÃÎÊȨÏÞµÄÈÝÆ÷Éϱ»ÀûÓã¬ËäÈ»´æÔÚÓÚÁ½¸ö²Ù×÷ϵͳƽ̨ÉÏ£¬µ«Ö»ÄÜÔÚLinuxÉϱ»ÀûÓá£Î¢Èí͸¶³Æ£¬¸Ã©¶´¿É±»ÓÃÀ´ÌáȨ£¬²¢»ñµÃ¶Ô×ÊÔ´Ö÷»úSF½ÚµãºÍÕû¸ö¼¯ÈºµÄ¿ØÖÆÈ¨¡£6ÔÂ14ÈÕ£¬¸Ã©¶´ÒÑÔÚService Fabric 9.0ÀÛ»ý¸üÐÂÖеõ½ÐÞ¸´¡£
https://unit42.paloaltonetworks.com/fabricscape-cve-2022-30137/
3¡¢Zscaler·¢ÏÖEvilnumÍÅ»ï»Ø¹é²¢Õë¶ÔÓ¢¹úºÍÅ·ÖÞµØÓò
ZscalerÔÚ6ÔÂ27Èճƣ¬EvilnumÍÅ»ïÒѾ»Ø¹é£¬²¢ÔÚ¹¥»÷»î¶¯ÖÐʹÓÃÁËеÄÕ½Êõ¡¢¼¼ÊõºÍ·¨Ê½¡£½ñÄê3Ô£¬Ñо¿ÈËÔ±·¢ÏÖÆäÄ¿±êÑ¡ÔñÓÐÖØ´ó±ä»»£¬ÓÉÔÀ´µÄ½ðÈڿƼ¼ÁìÓòµÄ×é֯ת±äΪ´¦Öùú¼ÊÒÆÃñ·þÎñµÄÕþ¸®¼ä×éÖ¯¡£¹¥»÷ʹÓõÄÓÕ¶üÎļþͨ³£¶¼°üÂ޺Ϲ棨compliance£©Ò»´Ê£¬ÆäÄ£°å×¢Èë½×¶ÎʹÓõĻùÓÚºêµÄÎĵµÀûÓÃÁËVBA code stomping¼¼ÊõÀ´Èƹý¾²Ì¬·ÖÎö²¢·ÀֹĿÏò¹¤³Ì£¬²¢Ê¹ÓÃÑÏÖØ»ìÏýµÄJavaScriptÀ´½âÃܲ¢°²×°payload¡£
https://www.zscaler.com/blogs/security-research/return-evilnum-apt-updated-ttps-and-new-targets
4¡¢Cyble³ÆÓÐÁè¼Ý90Íò¸öÅäÖôíÎóµÄKubernetes̻¶ÔÚÍøÉÏ
¾Ý6ÔÂ29ÈÕ±¨µÀ£¬CybleµÄÒ»Ïî·ÖÎö·¢ÏÖ£¬ÓÐÁè¼Ý900000¸öKubernetes̻¶ÔÚÍøÉÏ¡£KubernetesÊÇÒ»¸ö¸ß¶ÈͨÓõĿªÔ´ÈÝÆ÷±àÅÅϵͳ£¬Èç¹ûÅäÖò»ÕýÈ·£¬¿É±»Ô¶³Ì¹¥»÷Õß·ÃÎÊÄÚ²¿×ÊÔ´ºÍ˽ÓÐ×ʲú¡£Ñо¿ÈËԱʹÓÃÓë¹¥»÷ÕßÀàËÆµÄɨÃ蹤¾ßºÍËÑË÷²éѯÀ´¶¨Î»Ì»Â¶µÄKubernetesʵÀý£¬·¢ÏÖÆäÖÐ65%£¨585000̨£©Î»ÓÚÃÀ¹ú£¬9%λÓڵ¹ú£¬¶øºÉÀ¼ºÍ°®¶ûÀ¼¸÷Õ¼6%£»Ì»Â¶×î¶àµÄTCP¶Ë¿ÚÊÇ443£¬Æä´ÎÊǶ˿Ú10250ºÍ6443¡£
https://www.infosecurity-magazine.com/news/misconfigured-kubernetes-exposed/
5¡¢ÐÂľÂíZuoRATÖ÷ÒªÕë¶ÔλÓÚ±±ÃÀºÍÅ·ÖÞµÄSOHO·ÓÉÆ÷
Lumen Black Lotus LabsÔÚ6ÔÂ28ÈÕ͸¶£¬×Ô2020ÄêÒÔÀ´£¬ÐµĶ༶Զ³Ì·ÃÎÊľÂíZuoRATÒѱ»ÓÃÓÚͨ¹ýλÓÚ±±ÃÀºÍÅ·ÖÞµÄSOHO·ÓÉÆ÷¹¥»÷Ô¶³ÌÊÂÇéÈËÔ±¡£¹¥»÷ÕßÊ×ÏÈͨ¹ýɨÃèÒÑÖªµÄδÐÞ²¹Â©¶´¶Ô·ÓÉÆ÷µÄ½øÐгõʼ·ÃÎÊ£¬È»ºó°²×°Cobalt Strike beacons£¬ÒÔ¼°2¸ö×Ô½ç˵ºóÃÅ£º»ùÓÚC++µÄCBeacon£¬Ö÷ÒªÕë¶ÔWindowsϵͳ£»»ùÓÚGoµÄGoBeacon£¬Õë¶ÔLinuxºÍMacϵͳ¡£ZuoRAT»¹¿ÉÒÔ¼à¿ØDNSºÍHTTPSÁ÷Á¿£¬À´½Ù³ÖÇëÇó²¢Ê¹ÓÃÉú³ÉµÄÔ¤Éè¹æÔò½«Ä¿±êÖØ¶¨Ïòµ½¶ñÒâÓò£¬ÒÔ×ÌÈÅȡ֤·ÖÎö¡£
https://www.bleepingcomputer.com/news/security/new-zuorat-malware-targets-soho-routers-in-north-america-europe/
6¡¢SymantecÐû²¼¹ØÓÚ¼ÓÔØ·¨Ê½BumblebeeµÄ·ÖÎö³ÂËß
6ÔÂ28ÈÕ£¬SymantecÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þ¼ÓÔØ·¨Ê½BumblebeeµÄ·ÖÎö³ÂËß¡£Í¨¹ý·ÖÎö×î½üÉæ¼°BumblebeeµÄ¹¥»÷ÖÐʹÓÃµÄÆäËüÈý¸ö¹¤¾ß£¬Ñо¿ÈËÔ±½«ÆäÓëConti¡¢QuantumºÍMountlocker ÔÚÄÚµÄÐí¶àÀÕË÷ÍÅ»ïÁªÏµÆðÀ´¡£Æ¾¾ÝÕâЩ½ÏÔçµÄ¹¥»÷ÖÐʹÓõÄTTPsÍÆ²â£¬Bumblebee¿ÉÄÜÊÇ×÷ΪTrickbotºÍBazarLoaderµÄÌæ´ú¼ÓÔØ·¨Ê½ÍƳöµÄ¡£´ËÍ⣬ÕâЩ±»ÊÓ²ìµÄ¹¥»÷µÄÁíÒ»¸öÅäºÏµãÊǺϷ¨Èí¼þʹÓõÄÔö¼Ó£¬ConnectWise¡¢Atera¡¢SplashtopºÍAnyDeskµÈÔ¶³Ì×ÀÃæ¹¤¾ß¾³£·ºÆðÔÚ´ËÀ๥»÷ÖС£
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/bumblebee-loader-cybercrime